From Project To Kit: Instructions Are Everything
We’ve had two previous articles in this series on turning a personal electronic project into a saleable kit, in which we’ve examined the kit market in a broader context for a new entrant, and gone on to take a look at the process of assembling the hardware required to create a product. We’ve used an NE555 LED flasher as a simple example , from which we’ve gone through the exercise of setting a cost of production and therefore a retail price.
The remaining task required to complete our kit production is to write the documentation that will accompany it. These …read more
Tattoos by Robotic Arm With Pinpoint Accuracy
Tattoos are an ancient art, and as with most art, is usually the domain of human expertise. The delicate touch required takes years to master, but with the capacity for perfect accuracy and precision movements, enlisting a robotic arm and some clever software to tattoo a willing canvas is one step closer thanks to the efforts of [Pierre Emm] and [Johan da Silveira].
They began by using a 3D printer modified to ‘print’ with a tattoo needle. Catching the interest of the Applied Research Lab at Autodesk, the next logical step was to use an industrial robot arm get a …read more
Pimoroni Wash Their Hands Of Arduino
One of the big stories of last year was the fracture of the official Arduino supply into two competing organisations at daggers drawn, each headed by a different faction with its origins in the team that gave us the popular single board computers. Since then we’ve had Arduinos from Arduino LLC (the [Massimo] Arduino.cc, arguably the ‘original’, and Arduino trademark holder in the United States) and Arduino SRL (the [Musto] Arduino.org, and owner of the Arduino trademark everywhere except the US) , two websites, two forks of the IDE, and “real” Arduino boards available under a couple of names depending …read more
Tearing into Delta Sigma ADCs Part 2
In part one, I compared the different Analog to Digital Converters (ADC) and the roles and properties of Delta Sigma ADC’s. I covered a lot of the theory behind these devices, so in this installment, I set out to find a design or two that would help me demonstrate the important points like oversampling, noise shaping and the relationship between the signal-to-noise ratio and resolution.
Modulator Implementation
Check out part one to see the block diagrams of what what got us to here. The schematics shown below are of a couple of implementations that I played with depicting a single-order …read more
The First Evil Maid-Proof Computer
It doesn’t matter how many bits your password has, how proven your encryption is, or how many TrueCrypt volumes are on your computer. If someone wants data off your device, they can get it if they have physical access to your device. This is the ‘evil maid’ security scenario, named after hotel maids on the payroll of a three-letter agency. If someone has physical access to a laptop – even for an hour or two – the data on that laptop can be considered compromised. Until now, there has been no counter to this Evil Maid scenario, and for good …read more